bbot
OSINT automation for hackers
Name:bbot
Category:Recon
Publisher:trickest-mhmdiaa
Created:6/5/2023
Container:
quay.io/trickest/bbot:v2.0.0-patch-1
Output Type:
License:Unknown
Source:View Source
Parameters
--json
Output scan data in JSON format--name
Name of scan (default: random)--brief
Output only the data itself--debug
Enable debugging--flags
Enable modules by flag.--force
Run scan even if module setups fail--config
configuration options in key=value format: 'modules.shodan.api_key=1234'--preset
Enable BBOT preset(s)--silent
Be quiet--dry-run
Abort before executing scan--modules
Modules to enable.--no-deps
Don't install module dependencies--targets
Targets to seed the scan--verbose
Be more verbose--blacklist
Don't touch these things--whitelist
What's considered in-scope (by default it's the same as --targets)--force-deps
Force install all module dependencies--list-flags
List available flags.--retry-deps
Try again to install failed module dependencies--event-types
Choose which event types to display--allow-deadly
Enable the use of highly aggressive modules--list-modules
List available modules.--list-presets
List available presets.--strict-scope
Don't consider subdomains of target/whitelist to be in-scope--exclude-flags
Disable modules with these flags. (e.g. -ef aggressive)--require-flags
Only enable modules with these flags (e.g. -rf passive)--current-preset
Show the current preset in YAML format--custom-headers
List of custom headers as key value pairs (header=value).--output-modules
Output module(s). Choices: teams,emails,asset_inventory,web_report,stdout,subdomains,txt,discord,python,websocket,json,splunk,neo4j,http,csv,slack--exclude-modules
Exclude these modules.--install-all-deps
Install dependencies for all modules--custom-yara-rules
Add custom yara rules to excavate--ignore-failed-deps
Run modules even if they have failed dependencies--current-preset-full
Show the current preset in its full form, including defaults--list-module-options
Show all module config options